Vous êtes sur la page 1sur 50

2008 IBM Corporation

Archive with TSM for


Compliance and Noncompliance
Harley Puckett
Storage Consultant
Session ID: SAC01
2
2008 IBM Corporation
Archive with TSM for Compliance and Noncompliance
2008 IBM Corporation
2008 IBM Corporation
New Enterprise Forum: Information Infrastructure - IBM System Storage and Storage Networking Technical Symposium
15/08/2008
Disclaimers
IBM customers are responsible for ensuring their own compliance with legal
requirements. It is the customer's sole responsibility to obtain advice of competent
legal counsel as to the identification and interpretation of any relevant laws and
regulatory requirements that may affect the customer's business and any actions the
customer may need to take to comply with such laws.
IBM does not provide legal advice or represent or warrant that its services or
products will ensure that the customer is in compliance with any law.
The information contained in this documentation is provided for informational
purposes only. While efforts were made to verify the completeness and accuracy of
the information provided, it is provided as is without warranty of any kind, express or
implied. IBM shall not be responsible for any damages arising out of the use of, or
otherwise related to, this documentation or any other documentation. Nothing
contained in this documentation is intended to, nor shall have the effect of, creating
any warranties or representations from IBM (or its suppliers or licensors), or altering
the terms and conditions of the applicable license agreement governing the use of
IBM software.
3
2008 IBM Corporation
Archive with TSM for Compliance and Noncompliance
2008 IBM Corporation
2008 IBM Corporation
New Enterprise Forum: Information Infrastructure - IBM System Storage and Storage Networking Technical Symposium
15/08/2008
The Impact of Growth is Being Felt
Replicated data
Unstructured data
Traditional Structured data
Structured data growing at 32%
(databases for transactional
workloads)
Unstructured data growing at 63%
(such as user files, medical images,
web and rich media content)
Replicated data growing at 49%
(including backup, archive, business
analysis, discovery and business
continuance)
Sources: IDC worldwide enterprise disk in Exabytes from
Changing Enterprise Data Profile, December 2007
25.0
20.0
15.0
10.0
5.0
E
x
a
b
y
t
e
s
Information Infrastructure is doubling every 18 months
4
2008 IBM Corporation
Archive with TSM for Compliance and Noncompliance
2008 IBM Corporation
2008 IBM Corporation
New Enterprise Forum: Information Infrastructure - IBM System Storage and Storage Networking Technical Symposium
15/08/2008
Common Challenges with File System Growth
Contributors to Growth
New types of digital content (ie. Blogs, video, Images)
Richer content results in larger files
Ease of creating and sharing digital content
Exponential growth in number of files
Regulatory requirements
Keeping information longer
Effects of Growth
Out of space conditions
Increased management cost and complexity
Larger backup and restore windows
Longer searches and scans
Resizing LUNs impacts file systems
Increased power and cooling requirements
5
2008 IBM Corporation
Archive with TSM for Compliance and Noncompliance
2008 IBM Corporation
2008 IBM Corporation
New Enterprise Forum: Information Infrastructure - IBM System Storage and Storage Networking Technical Symposium
15/08/2008
Deconstructing the Symptoms of Growth
When trying to identify growth factors, it is
important to understand that often there is
a multiplying effect
Data containers can be files, folders,
databases, volumes, disk arrays, tape
libraries, drives, cartridges
Average per container can be bytes, watts,
cost, floor space, or hours
Number of Containers (35% growth)
A
v
e
r
a
g
e

p
e
r

c
o
n
t
a
i
n
e
r

(
2
5
%

g
r
o
w
t
h
)
6
3
%

G
r
o
w
t
h
6
2008 IBM Corporation
Archive with TSM for Compliance and Noncompliance
2008 IBM Corporation
2008 IBM Corporation
New Enterprise Forum: Information Infrastructure - IBM System Storage and Storage Networking Technical Symposium
15/08/2008
The Two Faces of File Systems Archiving
Space Management
move old, inactive files
to less expensive
storage, resulting in
reduced backup
windows and reduced
storage costs
File Systems
Tivoli Storage Manager (TSM) HSM for
Windows and Space Management for Unix
and Linux, TSM Archive Client, SSAM Client
Data Retention
Protect your data for the
long term with non-
erasable, non-rewriteable
storage solutions and
demonstrate compliance
to regulations
7
2008 IBM Corporation
Archive with TSM for Compliance and Noncompliance
2008 IBM Corporation
2008 IBM Corporation
New Enterprise Forum: Information Infrastructure - IBM System Storage and Storage Networking Technical Symposium
15/08/2008
Definition of Backup and Archiving
Backup is for recovery from hardware failure and/or recent
data corruption
Archive is for space management and long term retention
Archiving is an intelligent process for managing inactive or
infrequently accessed data, that still has value, while providing the
ability to preserve, search and retrieve the information during a
specified retention period.
8
2008 IBM Corporation
Archive with TSM for Compliance and Noncompliance
2008 IBM Corporation
2008 IBM Corporation
New Enterprise Forum: Information Infrastructure - IBM System Storage and Storage Networking Technical Symposium
15/08/2008
Compliant vs. Non-compliant Archive
Both
Can improve infrastructure performance
Database archiving
E-mail archiving
File archiving
Place data on appropriate tier of storage based on business value
Non Compliance Archive
Performance and space management
Non Regulated records retention
Long term retention of Data on lower
cost storage
Compliance Archive with Auditability
Data Retention
Demonstrate compliance with Regulatory
Requirements
Data Permanence
Implement and enforce retention policies
Non-erasable Non-rewriteable storage
Data Security
Privacy
Access controls
9
2008 IBM Corporation
Archive with TSM for Compliance and Noncompliance
2008 IBM Corporation
2008 IBM Corporation
New Enterprise Forum: Information Infrastructure - IBM System Storage and Storage Networking Technical Symposium
15/08/2008
IBM System Storage Archive Manager Overview
System Storage Archive Manager (SSAM)
Is a special TSM server
Is an archive/retrieve only solution
Archive: copy data or file from client to preserve for later use
Facilitates compliance with regulatory requirements
Has special data retention protections
Accepts data from TSM client API or the SSAM client
SSAM client = Archive only version of TSM B/A client
SSAM performs storage management
Manages data placement based on policies
Manages migration of data within storage hierarchy
10
2008 IBM Corporation
Archive with TSM for Compliance and Noncompliance
2008 IBM Corporation
2008 IBM Corporation
New Enterprise Forum: Information Infrastructure - IBM System Storage and Storage Networking Technical Symposium
15/08/2008
IBM System Storage Archive Manager Overview
SSAM is licensed by data capacity rather than number of processors
Primary storage pools only
System Storage Archive Manager provides archive management for IBMs Data
Retention 550 (DR550)
TSM support for WORM media, including
Network Appliance SnapLock
EMC Centera
3592 WORM tape
LTO WORM tape
11
2008 IBM Corporation
Archive with TSM for Compliance and Noncompliance
2008 IBM Corporation
2008 IBM Corporation
New Enterprise Forum: Information Infrastructure - IBM System Storage and Storage Networking Technical Symposium
15/08/2008
System Storage Archive Manager (SSAM) client
nodes and client software
A Client node is a Application server, Workstation, or File server registered with
the SSAM server
TSM client software is installed on the client node
Client software:
TSM API client:
Archive function calls usable with SSAM
Open API that allows business applications to use the server functions
Content Manager and FileNet are example API applications
TSM Backup/Archive client:
Users can archive files for long-term storage, optionally delete, and retrieve
them when necessary
Supported platforms:
http://www-306.ibm.com/software/tivoli/products/storage-mgr/platforms.html
12
2008 IBM Corporation
Archive with TSM for Compliance and Noncompliance
2008 IBM Corporation
2008 IBM Corporation
New Enterprise Forum: Information Infrastructure - IBM System Storage and Storage Networking Technical Symposium
15/08/2008
TSM Policy Management Concepts
Domain 2
TSM Server
Policy Domain 1
Backup Copy Group
Archive Copy Group
HSM Policy
Policy Domain 2
Backup Copy Group
Archive Copy Group
HSM Policy
Domain 1
Centrally defined polices Centrally defined polices
What data? What data?
Where to store it? Where to store it?
How long to keep it? How long to keep it?
File File- -Level granularity Level granularity
SSAM only uses the Archive Policy SSAM only uses the Archive Policy
DB
Disk pools
Tape pools
Optical pools
13
2008 IBM Corporation
Archive with TSM for Compliance and Noncompliance
2008 IBM Corporation
2008 IBM Corporation
New Enterprise Forum: Information Infrastructure - IBM System Storage and Storage Networking Technical Symposium
15/08/2008
Policy Domain
A set of policies and a group of nodes managed by those policies as
defined by the policy sets. A node (TSM client) may only be defined to
one policy domain (per TSM server).
Policy Set
A collection of Management Class (MC) definitions.
A Policy Domain may contain a number of Policy Sets.
Only one Policy Set in a domain can be active at any time.
Management Class (MC)
A collection of management attributes describing backup, archive, and
HSM characteristics.
A set of attributes is called a copy group, and there is a backup copy
group and an archive copy group. They are always named Standard
TSM Policies Management Concepts (continued)
With SSAM, only archive copy groups are used
14
2008 IBM Corporation
Archive with TSM for Compliance and Noncompliance
2008 IBM Corporation
2008 IBM Corporation
New Enterprise Forum: Information Infrastructure - IBM System Storage and Storage Networking Technical Symposium
15/08/2008
SSAM Storage Management Concept
Data is managed as objects
by policies
Or simply a block of data from an appl.
such as Content Manager
Files or directories
Each object is bound to management
class (policy) that defines
retention period,
initial storage pool, etc.
These objects exist in the TSM storage hierarchy on disk or tape in storage
pools
Objects can be migrated (moved) to another storage pool within the storage
hierarchy
freeing up storage space on higher performance devices such as disks
yielding attractive Total Cost of Ownership (TCO)
Objects can (and should) also be copied to copy pools
15
2008 IBM Corporation
Archive with TSM for Compliance and Noncompliance
2008 IBM Corporation
2008 IBM Corporation
New Enterprise Forum: Information Infrastructure - IBM System Storage and Storage Networking Technical Symposium
15/08/2008
SSAM Data Retention Protection
SSAM includes the following capabilities
Archive object protection
Archive object cannot be deleted until retention period is expired
Event Based retention policies
Allows starting retention period of objects based on an event
Deletion Hold / Release
Hold overrides retention time countdown
Hold & release controlled by API or SSAM/BA client
Following operations do not delete objects:
Client request to explicitly delete a object
API or SSAM/BA client
SSAM administrator commands:
DELETE FILESPACE
DELETE VOLUME DISCARDDATA=YES
AUDIT VOLUME FIX=YES
Additional Data Retention Protection:
Decreasing retention time of archived objects is not possible
Deleting retention policies (management classes) is not possible
16
2008 IBM Corporation
Archive with TSM for Compliance and Noncompliance
2008 IBM Corporation
2008 IBM Corporation
New Enterprise Forum: Information Infrastructure - IBM System Storage and Storage Networking Technical Symposium
15/08/2008
Data Retention Protection
Disallows explicit data deletion, prior to the retention criteria, through TSM
interfaces
TSM API e.g. dsmDeleteObj
TSM Administration e.g. DELETE FILESPACE
Leverages Archive Copy Group retention policy
No changes to automated expiration process
Day 0
Data stored
in TSM
Automated
Expiration
Data deleted in
TSM
X
API Delete
issued
DELETE
FILESPACE
Date Retention Criteria
Archive Copy Group Retention Policy
Deletion Hold/Release
17
2008 IBM Corporation
Archive with TSM for Compliance and Noncompliance
2008 IBM Corporation
2008 IBM Corporation
New Enterprise Forum: Information Infrastructure - IBM System Storage and Storage Networking Technical Symposium
15/08/2008
X
Chronological Based
Event Based with Fixed Protection Periods
Fixed Period
Minimum
Fixed Period
X
Event
Dispose after fixed period
from creation date
Dispose after fixed period
from event date
Day 0
Day 0
Chronological and Event Based Retention
Minimum
Fixed Period
Event Based with no Fixed Protection Period
X
Event
Dispose after event
Day 0
18
2008 IBM Corporation
Archive with TSM for Compliance and Noncompliance
2008 IBM Corporation
2008 IBM Corporation
New Enterprise Forum: Information Infrastructure - IBM System Storage and Storage Networking Technical Symposium
15/08/2008
Event-Based Archive Retention Policy
Not Applicable RETMIN=days
Clock starts when data is stored in TSM
RETMIN
Minimum #days to retain
RETVER Greater of (#days to Event)+RETVER
or RETMIN
Automated Expiration
Eligibility
RETVER=days or
NOLIMIT
RETVER=days or NOLIMIT RETVER
#days to retain after the clock
starts
RETINIT=CREATION
Clock starts when data is
stored in TSM
RETINIT=EVENT
Clock starts when API application invokes
dsmRetentionEvent
RETINIT
When to start RETVER clock
Chronological Retention Event-Based Retention Archive Copy Group
Day 0
Data stored
in TSM
RETMIN
API Event
issued
Automated
Expiration
Data deleted in
TSM
RETVER
X
19
2008 IBM Corporation
Archive with TSM for Compliance and Noncompliance
2008 IBM Corporation
2008 IBM Corporation
New Enterprise Forum: Information Infrastructure - IBM System Storage and Storage Networking Technical Symposium
15/08/2008
Deletion Hold / Release is a client API function
Issued by clients against individual objects
Once issued, server will not delete a object until hold is released
Deletion hold can be released by client
Deletion hold has to be issued by client who owns object
Works with both Chronological and Event based retention
Some Rules:
If hold exists and event based retention period expires, object is deleted when
hold is released.
If hold is released during a retention period it will be deleted after retention period
expires
hold status is not preserved with export
Deletion Hold/Release
20
2008 IBM Corporation
Archive with TSM for Compliance and Noncompliance
2008 IBM Corporation
2008 IBM Corporation
New Enterprise Forum: Information Infrastructure - IBM System Storage and Storage Networking Technical Symposium
15/08/2008
Deletion Hold and Release API Function
Day 0
Data stored
in TSM
RETMIN
API Event
issued
Automated
Expiration
Data deleted in
TSM
RETVER
X
Day 0
Data stored
in TSM
Automated
Expiration
Data deleted in
TSM
RETVER
X
API Hold
issued
API Release
issued
API Release
issued
API Hold
issued
Event-Based Retention Policy
Chronological Retention Policy
New! Archive API
function
21
2008 IBM Corporation
Archive with TSM for Compliance and Noncompliance
2008 IBM Corporation
2008 IBM Corporation
New Enterprise Forum: Information Infrastructure - IBM System Storage and Storage Networking Technical Symposium
15/08/2008
Expiration of Objects for SSAM
Automated Expiration:
Inventory expiration removes the SSAM database entries for objects marked for
expiration
Server does not immediately overwrite the data in storage pools
Immediate overwrite performed by Data Shredding for Random Access
Storage Pools only
Storage space reallocation or SSAM reuse of media:
Random access storage pool space reused
Occurs when storage is reallocated for new data
Sequential access storage pool overwrite
Occurs when entire VOLUME is reclaimed and recycled for new data
Sequential WORM space (tape) not reclaimed
22
2008 IBM Corporation
Archive with TSM for Compliance and Noncompliance
2008 IBM Corporation
2008 IBM Corporation
New Enterprise Forum: Information Infrastructure - IBM System Storage and Storage Networking Technical Symposium
15/08/2008
Overwrite of Deleted Data Data Shredding
Allows disk storage pools to be designated as shreddable
Random-access (not sequential access disk (devtype=file), not tape or other media types)
Primary pools
When a data object is moved or deleted from a shreddable pool, TSM server
overwrites the object (number of overwrites can be set up to 10)
Sensitive data objects are destroyed when deleted/moved, preventing undesirable
data discovery
a
b
a
b
a
c
b
Shreddable Storage Pool
b
b
a
c
Database
Database references
to object a
a
b
a
b
a
c
b
Shreddable Storage Pool
b
b
a
c
Database
Database references
deleted and object
a overwritten
Object a
deleted/moved
23
2008 IBM Corporation
Archive with TSM for Compliance and Noncompliance
2008 IBM Corporation
2008 IBM Corporation
New Enterprise Forum: Information Infrastructure - IBM System Storage and Storage Networking Technical Symposium
15/08/2008
TSM Transparent encryption
TSM provides simple key management
Available for TSM API applications; e.g. Content Manager, CommonStore, FileNet
TSM API Client generates a random encryption key password
Per data object selected by include. encrypt and exclude. encrypt criteria
TSM API Client passes encrypted data object encryption key password to TSM Server
across the wire
TSM Client-Server Session Key used to encrypt/decrypt
AES128 encryption used if BOTH Client and Server support it
HW Tape Drive Encryption ( IBM TS1120, TS1130 + LTO4 )
Device Class specification
One encryption key for each tape volume/cartridge
TSM Server generates, encrypts, and stores the encryption key in the TSM database
along with other tape volume metadata
TSM supports HW provided encryption modes, Application, System and Library
TSM manages key in Application mode, other modes transparent to TSM
Backup-Archive client simple key management support (TSM 5.5)
24
2008 IBM Corporation
Archive with TSM for Compliance and Noncompliance
2008 IBM Corporation
2008 IBM Corporation
New Enterprise Forum: Information Infrastructure - IBM System Storage and Storage Networking Technical Symposium
15/08/2008
DR550 DR2
Ranges from 8 to 244 TB of raw disk storage
capacity
Single or dual server options
Choice of Ethernet connections
Synchronous or asynchronous replication
options
Tape ready
Optional TS1120, LTO-3 or LTO-4 WORM
IBM DR550 DR2
IBM DR550 DR1
DR550 DR1
Ranges from .88 to 48.88 TB raw disk storage
capacity
Choice of Ethernet connections
Optional 25U rack with lockable doors
Tape ready
Optional TS1120, LTO-3 or LTO-4 WORM
IBM System Storage DR550 Family
25
2008 IBM Corporation
Archive with TSM for Compliance and Noncompliance
2008 IBM Corporation
2008 IBM Corporation
New Enterprise Forum: Information Infrastructure - IBM System Storage and Storage Networking Technical Symposium
15/08/2008
DR550 Compliance Solution Architecture Example
Three critical components are required to build a solution:
1. Business application
2. Content management application
3. Retention system - based on non-erasable / non-rewriteable technology
Business
Application
content
Reports, Documents,
Records, Customer
Correspondence
IBM Content Manager
IBM CM OnDemand
IBM FileNet Image Services
Policy-based non-erasable, non-
rewriteable storage system
Content Management or
Archiving application
SQL Server
DB2
IBM CommonStore
IBM FileNet
(Email Manager IS)
S
S
A
M

A
P
I

a
n
d

G
a
t
e
w
a
y
26
2008 IBM Corporation
Archive with TSM for Compliance and Noncompliance
2008 IBM Corporation
2008 IBM Corporation
New Enterprise Forum: Information Infrastructure - IBM System Storage and Storage Networking Technical Symposium
15/08/2008
File level Archive Support in Standard TSM
Supported with TSM Basic Edition and TSM Enterprise Edition
TSM B/A client and Api client
Event and Chronological based retention policies
Deletion Hold
TSM support for WORM media
Network Appliance SnapLock
EMC Centera
3592 WORM tape
LTO WORM tape
No Data Retention Protection
Data can be deleted by user or TSM Administrator
Policies can be modified and deleted
27
2008 IBM Corporation
Archive with TSM for Compliance and Noncompliance
2008 IBM Corporation
2008 IBM Corporation
New Enterprise Forum: Information Infrastructure - IBM System Storage and Storage Networking Technical Symposium
15/08/2008
Archiving Can Increase Efficiency
Inactive or infrequently accessed data can be migrated to different types/
tiers of storage in order to increase efficiencies
Source: SNIA/Source Consulting Savings can result from less costly infrastructure and improved efficiency
According to Forrester
Research 85% of production
data is inactive
68%not accessed in
last 90 days
According to IDC Active
Archiving Survey, 40% of
fixed content is active or
frequently accessed
Inactive
data
Active
data
Data Statistics
Source: Forrester Research, IDC
Archive
Disk
Online
Tape
Inactive
Data
High Duty Low Duty
Cycle Cycle
$

/

G
B
Production
Disk
Active Data
5

Y
e
a
r
s
2
0

Y
e
a
r
s
3

Y
e
a
r
s
1

Y
e
a
r
Retention Systems
28
2008 IBM Corporation
Archive with TSM for Compliance and Noncompliance
2008 IBM Corporation
2008 IBM Corporation
New Enterprise Forum: Information Infrastructure - IBM System Storage and Storage Networking Technical Symposium
15/08/2008
Definition of Hierarchical Storage Management (HSM)
A policy based management system for automatically
moving inactive files to less expensive storage,
resulting in reduced backup windows and reduced
storage costs
A policy based management system for automatically
moving inactive files to less expensive storage,
resulting in reduced backup windows and reduced
storage costs
The Space Management Face of File System Archiving
29
2008 IBM Corporation
Archive with TSM for Compliance and Noncompliance
2008 IBM Corporation
2008 IBM Corporation
New Enterprise Forum: Information Infrastructure - IBM System Storage and Storage Networking Technical Symposium
15/08/2008
250TB of storage, 25% growth over 10 years
Tape
$946,405
$7
$3.5
$0
M
i
l
l
i
o
n
s
SATA Disk
$6,365,950
Blended Disk
and Tape
$2,255,346
Hardware
Prod + DR Carts
Maintenance
Power & Cooling
Floor space
10 year TCO
Blended Tape and Disk Best Practices
Source: IBM TCO study for System Storage DR550, 2007
IBM Blended Disk and Tape Solutions Lower TCO
Consider the long-term costs of
ownership
High capacity SATA disk can
offer lower cost access to
online data
Tape is less expensive and
consumes less energy, but is
not often the best choice for
online access to data
A blended solution provides
online access to the most
recent data, with longer term
storage on energy-efficient
tape
30
2008 IBM Corporation
Archive with TSM for Compliance and Noncompliance
2008 IBM Corporation
2008 IBM Corporation
New Enterprise Forum: Information Infrastructure - IBM System Storage and Storage Networking Technical Symposium
15/08/2008
TSM Space Management
Centralized point of control for
Hierarchical Storage Management
(HSM)
File system selection
Effectiveness reporting
Automated management
Policy-based file selection
On-demand scheduling
Transparent recall
Platforms Supported
AIX, HP-UX, Linux-x86, Solaris
Windows 2003 NTFS v5
31
2008 IBM Corporation
Archive with TSM for Compliance and Noncompliance
2008 IBM Corporation
2008 IBM Corporation
New Enterprise Forum: Information Infrastructure - IBM System Storage and Storage Networking Technical Symposium
15/08/2008
TSM HSM the Basics
File Systems on Disk
TSM Server
TSM HSM Client
(File-/Appl.-Server)
Local or SAN-
attached
Local or SAN-
attached
LAN
or LAN-free
migrate
recall
Near line Storage
send with or w/o
compression
32
2008 IBM Corporation
Archive with TSM for Compliance and Noncompliance
2008 IBM Corporation
2008 IBM Corporation
New Enterprise Forum: Information Infrastructure - IBM System Storage and Storage Networking Technical Symposium
15/08/2008
TSM Storage Pool Hierarchy
Migration
Migration
Reclamation
Asynchronous
Copy
Storage Pool Hierarchy
Copy Pool
Synchronous (simultaneous)
Copy
Store
Client
TSM supports hundreds of storage
devices (disk, tape, optical, DVD)
Server storage is organized into storage
pools, each consisting of like devices
Hierarchical organization of storage pools
exploits attributes of each device type
(cost, performance, ability to remove
media)
Storage pool hierarchy supports automatic,
policy-based management of stored objects
Initial storage of objects in specified pool
Automatic migration to lower pools in hierarchy
Automatic space reclamation
Copying of data for disaster protection
(synchronously with initial store or
asynchronously)
Migration of data to new storage technologies
DB
TSM database tracks location
of files as they are copied or
moved in the hierarchy
33
2008 IBM Corporation
Archive with TSM for Compliance and Noncompliance
2008 IBM Corporation
2008 IBM Corporation
New Enterprise Forum: Information Infrastructure - IBM System Storage and Storage Networking Technical Symposium
15/08/2008
SAN
Sun
Solaris
HP/UX Linux
(Intel)
IBM AIX
LAN
FCP
TCP/IP Others
Any disk
including low cost S-ATA storage
Any tape
Windows 2003
IBM TSM HSM for Windows IBM TSM for Space Management
TSM: HSM - Managed Environments
34
2008 IBM Corporation
Archive with TSM for Compliance and Noncompliance
2008 IBM Corporation
2008 IBM Corporation
New Enterprise Forum: Information Infrastructure - IBM System Storage and Storage Networking Technical Symposium
15/08/2008
Overview of Client HSM
The Tivoli Storage Manager product family provides two HSM products
IBM Tivoli Storage Manager for Space Management
AIX (JFS2, GPFS), Linux (GPFS), Solaris (VxFS), HP-UX (VxFS)
IBM Tivoli Storage Manager HSM for Windows
Windows 2003 Server, Windows 2003 Enterprise Server (32 Bit), NTFS V5
HSM client automatically migrates files from on-line to near-line storage
(typically from disk to tape), based on policy settings
Small stub files are retained on disk, appearing as the original files, thus
ensuring transparency of HSM for user applications
Stub files contain information pointing to corresponding entry in TSM
server DB
Migrated files are recalled automatically back to disk as required
35
2008 IBM Corporation
Archive with TSM for Compliance and Noncompliance
2008 IBM Corporation
2008 IBM Corporation
New Enterprise Forum: Information Infrastructure - IBM System Storage and Storage Networking Technical Symposium
15/08/2008
Migration policy on UNIX
Primary selection criteria
Age and/or size
Weight factors allow for setting priorities
Exclude small files from becoming eligible at all (minmigfilesize)
Include/exclude statements allow directory and file selection
High Threshold defines when to start automigration
The maximum allocated file system capacity
Low Threshold defines when to stop automigration
Pre-migration percentage (optional)
Additional data migrated after Low Threshold
No stub created
Frees up online storage space faster during automigration
36
2008 IBM Corporation
Archive with TSM for Compliance and Noncompliance
2008 IBM Corporation
2008 IBM Corporation
New Enterprise Forum: Information Infrastructure - IBM System Storage and Storage Networking Technical Symposium
15/08/2008
UNIX
37
2008 IBM Corporation
Archive with TSM for Compliance and Noncompliance
2008 IBM Corporation
2008 IBM Corporation
New Enterprise Forum: Information Infrastructure - IBM System Storage and Storage Networking Technical Symposium
15/08/2008
Migration policy on Windows
An ILM type approach based on value of file
Does not avoid out of space conditions
Configure one or more migration jobs
A migration job consists of a Path or Directory name
Include/exclude filters can be added for
Known file groups or specify file name extensions
File size and age
Jobs can be executed periodically by starting them from the scheduler
Supports Recall Quota
Controls amount of recalls per user/group in a specific time period
All configured through the GUI
38
2008 IBM Corporation
Archive with TSM for Compliance and Noncompliance
2008 IBM Corporation
2008 IBM Corporation
New Enterprise Forum: Information Infrastructure - IBM System Storage and Storage Networking Technical Symposium
15/08/2008
Windows
39
2008 IBM Corporation
Archive with TSM for Compliance and Noncompliance
2008 IBM Corporation
2008 IBM Corporation
New Enterprise Forum: Information Infrastructure - IBM System Storage and Storage Networking Technical Symposium
15/08/2008
Windows Migration Changing of File Properties
Resident File
Offline Bit
Size on disk is one Cluster
Time stamp unchanged
Overlay Icon
Migrated File
40
2008 IBM Corporation
Archive with TSM for Compliance and Noncompliance
2008 IBM Corporation
2008 IBM Corporation
New Enterprise Forum: Information Infrastructure - IBM System Storage and Storage Networking Technical Symposium
15/08/2008
Interfaces to the TSM server
TSM
Server
File System
File U
TSM HSM
Client
UNIX File Server
File System
File W
TSM HSM
Client
Windows File Server
TSM API
library
HSM
Verbs
TSM Server
Storage Pool
(SPACEMGMT)
Storage Pool
(Archive)
Unique Object ID
Stub U
File U
different
interfaces
used internally
Pathname Qualifier
(FS/HL/LL)
Stub W
File W
Recommended to
set archive retention
forever to keep
data integrity!
41
2008 IBM Corporation
Archive with TSM for Compliance and Noncompliance
2008 IBM Corporation
2008 IBM Corporation
New Enterprise Forum: Information Infrastructure - IBM System Storage and Storage Networking Technical Symposium
15/08/2008
Backup integration: UNIX and Windows
UNIX File Server
Restore of stubs and complete files
through the same interface
Number of retained versions
controlled by VEREXISTS option
Inline copy can avoid network traffic
Windows file Server
Restore of stubs and complete files
through the same interface
Number of retained versions controlled
by VEREXISTS option
Both ways of backup integration allow restoring stubs for faster restore of a file
system
Older versions of file contents are kept on the TSM server
Best practice is to require file be backed up prior to migration
New in
V5.5
42
2008 IBM Corporation
Archive with TSM for Compliance and Noncompliance
2008 IBM Corporation
2008 IBM Corporation
New Enterprise Forum: Information Infrastructure - IBM System Storage and Storage Networking Technical Symposium
15/08/2008
Backup integration (backup)
TSM
Server
File System
TSM HSM
Client
UNIX File Server
File System
Windows File Server
Storage Pool
(SPACEMGMT)
Storage Pool
(Archive)
TSM Backup
Client*
TSM HSM
Client
TSM Backup
Client
Storage Pool
(Backup)
Stub U
File U
File U
File W
File W
File W
Inline copy
know the link!
(no network traffic)
TSM Server
Stub W
Stub W
43
2008 IBM Corporation
Archive with TSM for Compliance and Noncompliance
2008 IBM Corporation
2008 IBM Corporation
New Enterprise Forum: Information Infrastructure - IBM System Storage and Storage Networking Technical Symposium
15/08/2008
Backup integration (restore)
TSM
Server
File System
TSM HSM
Client
UNIX File Server
File System
Windows File Server
Storage Pool
(SPACEMGMT)
Storage Pool
(Archive)
TSM Backup
Client*
TSM HSM
Client
TSM Backup
Client
Storage Pool
(Backup)
File W
TSM Server
restore
File U
File U
Stub U
restore
(migstate=yes)
Recreating unique
object ID
Stub W
Stub W
File W
File W
44
2008 IBM Corporation
Archive with TSM for Compliance and Noncompliance
2008 IBM Corporation
2008 IBM Corporation
New Enterprise Forum: Information Infrastructure - IBM System Storage and Storage Networking Technical Symposium
15/08/2008
Backup integration (versions)
TSM
Server
File System
TSM HSM
Client
UNIX File Server
File System
Windows File Server
Storage Pool
(SPACEMGMT)
Storage Pool
(Archive)
TSM Backup
Client*
TSM HSM
Client
TSM Backup
Client
Storage Pool
(Backup)
File W
Stub U
File U
File U
File W
File W
TSM Server
Stub U*
File U*
File U*
copygroup
(verexists=2)
U*/W*
file U/W contains
now modified
contents and
gets migrated
again
Stub W*
Stub W*
copygroup
(verexists=2)
45
2008 IBM Corporation
Archive with TSM for Compliance and Noncompliance
2008 IBM Corporation
2008 IBM Corporation
New Enterprise Forum: Information Infrastructure - IBM System Storage and Storage Networking Technical Symposium
15/08/2008
Value of IBM TSM HSM Archive Solutions
IBM offers complete end-to-end HSM solutions for Windows and Unix file
systems
Policy based automation reduces manual effort
Identify and move low-activity or inactive files to a hierarchy of lower-cost storage
Eliminate manual file system clean-up activities
Speed file-server recovery times by restoring files to migrated state, deferring data
restore until needed
Support for transparent media migration for longevity and cost-effectiveness
Tiered information infrastructure reduces cost
Blend disk and tape solutions for optimum efficiency and performance
Ensure information integrity with flexible and scalable non-erasable, non-rewriteable
storage
Secure and protect information with encryption and automated retention policies
46
2008 IBM Corporation
Archive with TSM for Compliance and Noncompliance
2008 IBM Corporation
2008 IBM Corporation
New Enterprise Forum: Information Infrastructure - IBM System Storage and Storage Networking Technical Symposium
15/08/2008
For More Information
Tivoli User Community
An active and lively community for Clients, Business Partners, and IT professionals.
Free membership provides you with valuable resources, tools and networking
capability. Log on to www.tivoli-ug.org or visit the ped in the IBM Pulse Expo
Tivoli Training
IBM offers technical training and education services to help you acquire,
maintain and optimize your IT skills. For a complete Tivoli Course Catalog and
Certification Exams visit www.ibm.com/software/tivoli/education
Tivoli Services
With IBM Software Services for Tivoli, you get the most knowledgeable experts
on Tivoli technology to accelerate your implementation. For a complete list of
Services Offerings visit www.ibm.com/software/tivoli/services
Tivoli Support
IBM Software Premium Support provides an extra layer of proactive support,
skills sharing and problem management, personalized to your environment.
Visit www.ibm.com/software/support/premium/ps_enterprise.html
47
2008 IBM Corporation
Archive with TSM for Compliance and Noncompliance
2008 IBM Corporation
2008 IBM Corporation
New Enterprise Forum: Information Infrastructure - IBM System Storage and Storage Networking Technical Symposium
15/08/2008
48
2008 IBM Corporation
Archive with TSM for Compliance and Noncompliance
2008 IBM Corporation
2008 IBM Corporation
New Enterprise Forum: Information Infrastructure - IBM System Storage and Storage Networking Technical Symposium
15/08/2008
References Tivoli Storage Manager for Space Managment
TSM for Space Management on the Web (also Demo available):
http://www-306.ibm.com/software/tivoli/products/storage-mgr-space/
http://www-306.ibm.com/software/tivoli/library/demos/dem-stg-mgmt-hsm.html?S_CMP=rnav
TSM for Space Management Client Manual (Order Number: SC32-0148-01):
http://www.elink.ibmlink.ibm.com/publications/servlet/pbi.wss?SSN=08DBJ0038813141909&FNC=
PBL&PBL=SC32-0148-01PBCEEBO200040677&TRL=TXTSRH
TSM for Space Management platform support information:
http://www-306.ibm.com/software/tivoli/products/storage-mgr/platforms.html
TSM for Space Management IBM Tivoli Enterprise Space Management Console:
http://www-306.ibm.com/software/tivoli/resource-center/storage/code-ent-con-stor-mgr-space.jsp
TSM for Space Management white paper (will be updated 08/08):
http://www-1.ibm.com/support/docview.wss?uid=swg27002498
RSCT download
http://ftp.software.ibm.com/storage/tivoli-storage-
management/maintenance/client/v5r5/Linux/LinuxX86/HSM_RSCT/
http://www14.software.ibm.com/webapp/set2/sas/f/csm/download/home.html
49
2008 IBM Corporation
Archive with TSM for Compliance and Noncompliance
2008 IBM Corporation
2008 IBM Corporation
New Enterprise Forum: Information Infrastructure - IBM System Storage and Storage Networking Technical Symposium
15/08/2008
References Tivoli Storage Manager HSM for Windows
TSM HSM for Windows on the Web:
http://www-306.ibm.com/software/tivoli/products/storage-mgr-hsm/
TSM HSM for Windows Manuals:
http://publib.boulder.ibm.com/infocenter/tivihelp/v1r1/index.jsp?topic=/com.ibm.itsmhsmw.doc/hs
m_win.html
TSM HSM for Windows platform support information:
http://www-306.ibm.com/software/tivoli/products/storage-mgr-hsm/platforms.html
Redbook on HSM for Windows:
http://www.redbooks.ibm.com/redpapers/pdfs/redp4126.pdf
50
2008 IBM Corporation
Archive with TSM for Compliance and Noncompliance
2008 IBM Corporation
2008 IBM Corporation
New Enterprise Forum: Information Infrastructure - IBM System Storage and Storage Networking Technical Symposium
15/08/2008
8 IBM Corporation 1994-2008. All rights reserved.
References in this document to IBM products or services do not imply that IBM intends to make them available in every country.
Trademarks of International Business Machines Corporation in the United States, other countries, or both can be found on the World Wide Web at
http://www.ibm.com/legal/copytrade.shtml.
Intel, Intel logo, Intel Inside, Intel Inside logo, Intel Centrino, Intel Centrino logo, Celeron, Intel Xeon, Intel SpeedStep, Itanium, and Pentium are trademarks or registered
trademarks of Intel Corporation or its subsidiaries in the United States and other countries.
Linux is a registered trademark of Linus Torvalds in the United States, other countries, or both.
Microsoft, Windows, Windows NT, and the Windows logo are trademarks of Microsoft Corporation in the United States, other countries, or both.
UNIX is a registered trademark of The Open Group in the United States and other countries.
Java and all Java-based trademarks are trademarks of Sun Microsystems, Inc. in the United States, other countries, or both.
Other company, product, or service names may be trademarks or service marks of others.
Information is provided "AS IS" without warranty of any kind.
The customer examples described are presented as illustrations of how those customers have used IBM products and the results they may have achieved. Actual
environmental costs and performance characteristics may vary by customer.
Information concerning non-IBM products was obtained from a supplier of these products, published announcement material, or other publicly available sources and does
not constitute an endorsement of such products by IBM. Sources for non-IBM list prices and performance numbers are taken from publicly available information,
including vendor announcements and vendor worldwide homepages. IBM has not tested these products and cannot confirm the accuracy of performance, capability, or
any other claims related to non-IBM products. Questions on the capability of non-IBM products should be addressed to the supplier of those products.
All statements regarding IBM future direction and intent are subject to change or withdrawal without notice, and represent goals and objectives only.
Some information addresses anticipated future capabilities. Such information is not intended as a definitive statement of a commitment to specific levels of performance,
function or delivery schedules with respect to any future products. Such commitments are only made in IBM product announcements. The information is presented here
to communicate IBM's current investment and development activities as a good faith effort to help with our customers' future planning.
Performance is based on measurements and projections using standard IBM benchmarks in a controlled environment. The actual throughput or performance that any
user will experience will vary depending upon considerations such as the amount of multiprogramming in the user's job stream, the I/O configuration, the storage
configuration, and the workload processed. Therefore, no assurance can be given that an individual user will achieve throughput or performance improvements
equivalent to the ratios stated here.
Photographs shown may be engineering prototypes. Changes may be incorporated in production models.
Trademarks and Disclaimers